Code based cryptosystems often need to encode either a message or a random bitstring into one of fixed length and fixed (Hamming) weight. The lack of an efficient and reliable bijective map presents a problem in building constructions around the said cryptosystems to attain security against active attackers. We present an efficiently computable, bijective function which yields the desired mapping. Furthermore, we delineate how the said function can be computed in constant time. We experimentally validate the effectiveness and efficiency of our approach, comparing it against the current state of the art solutions, achieving three to four orders of magnitude improvements in computation time, and validate its constant runtim
Code-Based Cryptography is a branch of the Post-Quantum Cryptography research area. As such, its foc...
This paper presents extremely fast algorithms for code-based public-key cryptography, including full...
Treballs Finals de Grau de Matemàtiques, Facultat de Matemàtiques, Universitat de Barcelona, Any: 20...
Code based cryptosystems often need to encode either a message or a random bitstring into one of fix...
Software artifact corresponding to the Constant Weight Strings in Constant Time: a Building Block fo...
This paper presents extremely fast algorithms for code-based public-key cryptography, including full...
This thesis studies efficiency and security problems of implementations of code-based cryptosystems....
Public-key cryptographic algorithms are an essential part of todays cyber security, since those are ...
This paper presents a constant-time fast implementation for a high-security code-based encryption sy...
Post-quantum cryptosystems have currently seen a surge in interest thanks to the current standardiza...
In this chapter, a more memory-efficient method for encoding binary information into words of prescr...
The security of public-key cryptography depends on the computational intractability of some hard pro...
In modern cryptography, the security of the most secure cryptographic primitives is based on hard pr...
In this paper, we seek to understand some basic principles of coding theory. Specifically, we define...
Today, cryptographic applications are used in nearly all areas of our lives, including the economy, ...
Code-Based Cryptography is a branch of the Post-Quantum Cryptography research area. As such, its foc...
This paper presents extremely fast algorithms for code-based public-key cryptography, including full...
Treballs Finals de Grau de Matemàtiques, Facultat de Matemàtiques, Universitat de Barcelona, Any: 20...
Code based cryptosystems often need to encode either a message or a random bitstring into one of fix...
Software artifact corresponding to the Constant Weight Strings in Constant Time: a Building Block fo...
This paper presents extremely fast algorithms for code-based public-key cryptography, including full...
This thesis studies efficiency and security problems of implementations of code-based cryptosystems....
Public-key cryptographic algorithms are an essential part of todays cyber security, since those are ...
This paper presents a constant-time fast implementation for a high-security code-based encryption sy...
Post-quantum cryptosystems have currently seen a surge in interest thanks to the current standardiza...
In this chapter, a more memory-efficient method for encoding binary information into words of prescr...
The security of public-key cryptography depends on the computational intractability of some hard pro...
In modern cryptography, the security of the most secure cryptographic primitives is based on hard pr...
In this paper, we seek to understand some basic principles of coding theory. Specifically, we define...
Today, cryptographic applications are used in nearly all areas of our lives, including the economy, ...
Code-Based Cryptography is a branch of the Post-Quantum Cryptography research area. As such, its foc...
This paper presents extremely fast algorithms for code-based public-key cryptography, including full...
Treballs Finals de Grau de Matemàtiques, Facultat de Matemàtiques, Universitat de Barcelona, Any: 20...